RE: Can anyone break this Cisco 4912G password? [7:40505]
I just ran both of the hashes against a 20Mb wordlist using John the Ripper with no luck. (Looks like you might have to perform some password recovery.) Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40753&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Can anyone break this Cisco 4912G password? [7:40505]
Boson has some free utilities that include a password breaker. IT won't work if you have the high level encryption enabled. Someone posted some equipment for sale once on e-bay. They gave a limited logon, and did a show config. I cracked the password utility with the boson cracker and when it prompted for a password for higher level stuff I entered it and it worked. I didn't do anything to the machine of course, and I did let the seller know. But most people are aware of it. Also another common password I found is the company name. Robert -Original Message- From: Tom Monte [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 4:48 PM To: [EMAIL PROTECTED] Subject: RE: Can anyone break this Cisco 4912G password? [7:40505] It is possible to break a Cisco IOS password. I had a piece of software on my Palm Pilot that does it, but I left it home. :( I know there are alot of others and there was a website that did it at one point. Cisco password encryption isn't that strong. I would try "password", "cisco" and the name of your company before you go any further. If you know something about the person who set it up, you could try things related to them. People tend to pick there children or a favorite sport as a password or simply ask him or her if they are available. I will look around and see if I can find something to break them for you. -Original Message- From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 2:10 PM To: [EMAIL PROTECTED] Subject: Can anyone break this Cisco 4912G password? [7:40505] I have forgotten the enable level password on this Cisco 4912G Catalyst OS switch. I don't want to go through the Password Recovery Procedure on this production switch. Can you help? Thanks Glenn set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0 set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70 This e-mail and any files transmitted with it are intended solely for the person(s) to whom it is addressed. If you are not the intended recipient, please delete the message and all copies of it from your system, destroy any hard copies of it and contact the sender by return e-mail. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40579&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Can anyone break this Cisco 4912G password? [7:40505]
By the way, Solarwinds also sells a commercial (Windows) product that also handles configs via SNMP: their Cisco config uploader/downloader. They offer a 30-day demo (crippled, of course) but I liked it enough to buy a copy: http://www.solarwinds.net/tools.htm Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40533&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Can anyone break this Cisco 4912G password? [7:40505]
> switch. I don't want to go through the Password Recovery > Procedure on this production switch. Can you help? I assume that you don't have SNMP enabled with read/write? That way you'd only need the community string to reset the password. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40524&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Can anyone break this Cisco 4912G password? [7:40505]
It is possible to break a Cisco IOS password. I had a piece of software on my Palm Pilot that does it, but I left it home. :( I know there are alot of others and there was a website that did it at one point. Cisco password encryption isn't that strong. I would try "password", "cisco" and the name of your company before you go any further. If you know something about the person who set it up, you could try things related to them. People tend to pick there children or a favorite sport as a password or simply ask him or her if they are available. I will look around and see if I can find something to break them for you. -Original Message- From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 2:10 PM To: [EMAIL PROTECTED] Subject: Can anyone break this Cisco 4912G password? [7:40505] I have forgotten the enable level password on this Cisco 4912G Catalyst OS switch. I don't want to go through the Password Recovery Procedure on this production switch. Can you help? Thanks Glenn set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0 set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70 This e-mail and any files transmitted with it are intended solely for the person(s) to whom it is addressed. If you are not the intended recipient, please delete the message and all copies of it from your system, destroy any hard copies of it and contact the sender by return e-mail. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40531&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Can anyone break this Cisco 4912G password? [7:40505]
DOH! Copied the wrong thangy! -Original Message- From: Ole Drews Jensen [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 2:53 PM To: Steve Smith; [EMAIL PROTECTED] Subject: RE: Can anyone break this Cisco 4912G password? [7:40505] The password you cracked Steve, was the example they had on the site you found the password cracker :-) Ole ~ Ole Drews Jensen Systems Network Manager CCNP, MCSE, MCP+I RWR Enterprises, Inc. [EMAIL PROTECTED] ~ http://www.RouterChief.com ~ Need a Job? http://www.OleDrews.com/job ~ -Original Message- From: Steve Smith [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 2:27 PM To: [EMAIL PROTECTED] Subject: RE: Can anyone break this Cisco 4912G password? [7:40505] its time to go to lunch who knows the other one. -Original Message- From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 1:10 PM To: [EMAIL PROTECTED] Subject: Can anyone break this Cisco 4912G password? [7:40505] I have forgotten the enable level password on this Cisco 4912G Catalyst OS switch. I don't want to go through the Password Recovery Procedure on this production switch. Can you help? Thanks Glenn set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0 set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70 Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40523&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
Re: Can anyone break this Cisco 4912G password? [7:40505]
well after reading up on cisco's site, that switch is not vulnerable...their list of vulnerable switches are as follows 700 series dialup routers (750, 760, and 770 series) are not affected. Catalyst 1900, 2800, 2900, 3000, and 5000 series LAN switches are not affected. However, optional router modules running Cisco IOS software in switch backplanes, such as the RSM module for the Catalyst 5000 and 5500, are affected (see the Affected Products section above). The Catalyst 6000 is not affected if it is not running IOS. WAN switching products in the IGX and BPX lines are not affected. The MGX (formerly known as the AXIS shelf) is not affected. No host-based software is affected. The Cisco PIX Firewall is not affected. The Cisco LocalDirector is not affected. The Cisco Cache Engine is not affected >>> "Patrick Ramsey" 04/04/02 03:58PM >>> have you tried the http exploit? >>> "Patrick Ramsey" 04/04/02 03:44PM >>> does it run ios? I've never dealt with that make...is http enabled? -Patrick >>> "Orlosky, Glenn M" 04/04/02 02:09PM >>> I have forgotten the enable level password on this Cisco 4912G Catalyst OS switch. I don't want to go through the Password Recovery Procedure on this production switch. Can you help? Thanks Glenn set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0 set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70 > Confidentiality Disclaimer Confidentiality Disclaimer Confidentiality Disclaimer Confidentiality Disclaimer Confidentiality Disclaimer This email and any files transmitted with it may contain confidential and /or proprietary information in the possession of WellStar Health System, Inc. ("WellStar") and is intended only for the individual or entity to whom addressed. This email may contain information that is held to be privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient, you are hereby notified that any unauthorized access, dissemination, distribution or copying of any information from this email is strictly prohibited, and may subject you to criminal and/or civil liability. If you have received this email in error, please notify the sender by reply email and then delete this email and its attachments from your computer. Thank you. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40521&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Can anyone break this Cisco 4912G password? [7:40505]
The password you cracked Steve, was the example they had on the site you found the password cracker :-) Ole ~ Ole Drews Jensen Systems Network Manager CCNP, MCSE, MCP+I RWR Enterprises, Inc. [EMAIL PROTECTED] ~ http://www.RouterChief.com ~ Need a Job? http://www.OleDrews.com/job ~ -Original Message- From: Steve Smith [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 2:27 PM To: [EMAIL PROTECTED] Subject: RE: Can anyone break this Cisco 4912G password? [7:40505] its time to go to lunch who knows the other one. -Original Message- From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 1:10 PM To: [EMAIL PROTECTED] Subject: Can anyone break this Cisco 4912G password? [7:40505] I have forgotten the enable level password on this Cisco 4912G Catalyst OS switch. I don't want to go through the Password Recovery Procedure on this production switch. Can you help? Thanks Glenn set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0 set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70 Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40520&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
Re: Can anyone break this Cisco 4912G password? [7:40505]
have you tried the http exploit? >>> "Patrick Ramsey" 04/04/02 03:44PM >>> does it run ios? I've never dealt with that make...is http enabled? -Patrick >>> "Orlosky, Glenn M" 04/04/02 02:09PM >>> I have forgotten the enable level password on this Cisco 4912G Catalyst OS switch. I don't want to go through the Password Recovery Procedure on this production switch. Can you help? Thanks Glenn set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0 set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70 > Confidentiality Disclaimer Confidentiality Disclaimer Confidentiality Disclaimer This email and any files transmitted with it may contain confidential and /or proprietary information in the possession of WellStar Health System, Inc. ("WellStar") and is intended only for the individual or entity to whom addressed. This email may contain information that is held to be privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient, you are hereby notified that any unauthorized access, dissemination, distribution or copying of any information from this email is strictly prohibited, and may subject you to criminal and/or civil liability. If you have received this email in error, please notify the sender by reply email and then delete this email and its attachments from your computer. Thank you. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40519&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
Re: Can anyone break this Cisco 4912G password? [7:40505]
does it run ios? I've never dealt with that make...is http enabled? -Patrick >>> "Orlosky, Glenn M" 04/04/02 02:09PM >>> I have forgotten the enable level password on this Cisco 4912G Catalyst OS switch. I don't want to go through the Password Recovery Procedure on this production switch. Can you help? Thanks Glenn set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0 set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70 > Confidentiality Disclaimer This email and any files transmitted with it may contain confidential and /or proprietary information in the possession of WellStar Health System, Inc. ("WellStar") and is intended only for the individual or entity to whom addressed. This email may contain information that is held to be privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient, you are hereby notified that any unauthorized access, dissemination, distribution or copying of any information from this email is strictly prohibited, and may subject you to criminal and/or civil liability. If you have received this email in error, please notify the sender by reply email and then delete this email and its attachments from your computer. Thank you. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40516&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Can anyone break this Cisco 4912G password? [7:40505]
its time to go to lunch who knows the other one. -Original Message- From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 1:10 PM To: [EMAIL PROTECTED] Subject: Can anyone break this Cisco 4912G password? [7:40505] I have forgotten the enable level password on this Cisco 4912G Catalyst OS switch. I don't want to go through the Password Recovery Procedure on this production switch. Can you help? Thanks Glenn set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0 set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70 Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40513&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: Can anyone break this Cisco 4912G password? [7:40505]
Password recovery time mate. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=40506&t=40505 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]